Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1104: CWE-862 Missing Authorization in ninjateam FastDup – Fastest WordPress Migration & Duplicator

0
High
VulnerabilityCVE-2026-1104cvecve-2026-1104cwe-862
Published: Thu Feb 12 2026 (02/12/2026, 14:25:40 UTC)
Source: CVE Database V5
Vendor/Project: ninjateam
Product: FastDup – Fastest WordPress Migration & Duplicator

Description

The FastDup – Fastest WordPress Migration & Duplicator plugin for WordPress is vulnerable to unauthorized backup creation and download due to a missing capability check on REST API endpoints in all versions up to, and including, 2.7.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to create and download full-site backup archives containing the entire WordPress installation, including database exports and configuration files.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:56:47 UTC

Technical Analysis

CVE-2026-1104 is a critical authorization bypass vulnerability identified in the FastDup – Fastest WordPress Migration & Duplicator plugin, widely used for WordPress site migration and backup. The root cause is a missing capability check on REST API endpoints that handle backup creation and download requests. Specifically, the plugin fails to verify whether the authenticated user has sufficient privileges before allowing these sensitive operations. As a result, any authenticated user with Contributor-level permissions or higher can exploit this flaw to generate and download a complete backup archive of the WordPress site. This archive includes all website files, database exports, and configuration files, exposing sensitive credentials, site configurations, and potentially user data. The vulnerability affects all versions up to and including 2.7.1. The CVSS v3.1 base score is 8.8, indicating a high-severity issue with network attack vector, low attack complexity, and no user interaction required. The scope is unchanged but the impact on confidentiality, integrity, and availability is high because attackers can exfiltrate critical site data and potentially leverage it for further attacks. Although no public exploits have been observed, the vulnerability is straightforward to exploit for any authenticated user with minimal privileges. This makes it a significant risk for WordPress sites using this plugin, especially those with multiple contributors or editors. The vulnerability was publicly disclosed in February 2026, with no official patches available at the time of reporting, increasing urgency for mitigation.

Potential Impact

The impact of CVE-2026-1104 is substantial for organizations running WordPress sites with the FastDup plugin installed. Attackers with Contributor-level access can bypass authorization controls to obtain full backups containing sensitive information such as database credentials, user data, and site configuration files. This can lead to complete site compromise, data breaches, and further lateral attacks such as privilege escalation or persistent backdoors. The integrity of the site can be undermined if attackers modify backups or configurations. Availability may also be affected if attackers delete or corrupt backups or site data. Organizations relying on this plugin for migration or backup are at risk of data exfiltration and operational disruption. The vulnerability is particularly dangerous in environments with multiple authenticated users or where Contributor roles are assigned liberally. The lack of known exploits in the wild does not reduce the risk, given the ease of exploitation and high impact. This vulnerability could also be leveraged in targeted attacks against high-value WordPress sites, including e-commerce, media, and government portals.

Mitigation Recommendations

To mitigate CVE-2026-1104, organizations should immediately restrict Contributor-level and higher user roles from accessing the FastDup plugin’s backup and migration features until a patch is available. Implement custom capability checks or use WordPress hooks to enforce strict authorization on REST API endpoints related to backup creation and download. Monitor and audit user roles and permissions to ensure minimal privilege principles are enforced, limiting Contributor access where possible. Disable or uninstall the FastDup plugin if it is not essential. Regularly update the plugin as soon as the vendor releases a patch addressing this vulnerability. Additionally, implement web application firewalls (WAFs) with rules to detect and block suspicious REST API calls related to backup operations. Conduct thorough logging and alerting on backup creation and download activities to detect unauthorized attempts. Finally, educate site administrators about the risks of granting Contributor-level access and encourage strong authentication controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-17T01:44:21.479Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698de86ac9e1ff5ad8e08f98

Added to database: 2/12/2026, 2:49:14 PM

Last enriched: 2/26/2026, 6:56:47 PM

Last updated: 3/29/2026, 9:35:32 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses